Cluster Server Agent for Docker Installation and Configuration Guide

Size: px
Start display at page:

Download "Cluster Server Agent for Docker Installation and Configuration Guide"

Transcription

1 Cluster Server Agent for Docker Installation and Configuration Guide Linux 6.2 September 2015

2 Cluster Server Agent for Docker Installation and Configuration Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Agent Version: 6.2 Document version: 6.2 Rev 1 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, the Veritas Logo, InfoScale, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA

3 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information

4 Available memory, disk space, and NIC information Operating system Version and patch level Network topology Licensing and registration Customer service Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals

5 Support agreement resources If you want to contact us regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America About Symantec Connect Symantec Connect is the peer-to-peer technical community site for Symantec s enterprise customers. Participants can connect and share information with other product users, including creating forum posts, articles, videos, downloads, blogs and suggesting ideas, as well as interact with Symantec product teams and Technical Support. Content is rated by the community, and members receive reward points for their contributions. Documentation Product guides are available on the media in PDF format. Make sure that you are using the current version of the documentation. The document version appears on page 2 of each guide. The latest product documentation is available on the Symantec website. Your feedback on product documentation is important to us. Send suggestions for improvements and reports on errors or omissions. Include the title and document version (located on the second page), and chapter and section titles of the text on which you are reporting. Send feedback to: doc_feedback@symantec.com For information regarding the latest HOWTO articles, documentation updates, or to ask a question regarding product documentation, visit the Storage and Clustering Documentation forum on Symantec Connect. forums/storage-and-clustering-documentation

6 Contents Technical Support... 3 Chapter 1 Introducing the agents for Docker... 9 About the Cluster Server agents for Docker Daemon and Docker Container... 9 Supported software How the agents makes Docker highly available Features of the agents Docker Daemon agent functions Online Offline Monitor Clean imf_init imf_getnotification imf_register Docker Container agent functions Online Offline Monitor Clean imf_init imf_getnotification imf_register Typical Docker configuration in a VCS cluster Setting up Docker in a VCS cluster Chapter 2 Introducing Docker and Docker Daemon process About Docker Docker Daemon process Recommendations for configuring Docker... 17

7 Contents 7 Chapter 3 Installing and removing the agents for Docker Before you install the Cluster Server agents for Docker About the ACC library Installing the ACC library Installing the agents Removing the agents Removing the ACC library Chapter 4 Configuring the agents for Docker About configuring the Cluster Server agents for Docker Importing the agent types files in a VCS environment Docker Daemon agent attributes About the keys of the IMF attribute Enabling the Docker Daemon agent to support IMF Disabling intelligent resource monitoring Docker Container agent attributes About the keys of the IMF attribute Enabling the Docker Container agent to support IMF Disabling intelligent resource monitoring Limitations of VCS Docker agents Chapter 5 Configuring service groups for Docker About configuring service groups for Docker Before configuring the service groups for Docker Configuring service groups for Docker Daemon Configuring service groups for Docker Container Chapter 6 Troubleshooting the agents for Docker Preliminary troubleshooting checks Starting the Docker Daemon instance outside a cluster Starting the Docker Container instance outside a cluster Reviewing log files Using trace level logging Troubleshooting the agent Appendix A Sample Configurations About sample configurations for the agents for Docker Sample agent type definition for Docker Daemon Sample agent type definition for Docker Container... 47

8 Contents 8 Sample Docker resource configuration Sample configuration for Docker Sample service group dependency Index... 54

9 Chapter 1 Introducing the agents for Docker This chapter includes the following topics: About the Cluster Server agents for Docker Daemon and Docker Container How the agents makes Docker highly available Features of the agents Docker Daemon agent functions Docker Container agent functions Typical Docker configuration in a VCS cluster Setting up Docker in a VCS cluster About the Cluster Server agents for Docker Daemon and Docker Container The Cluster Server (VCS) agents monitor specific resources within an enterprise application. They determine the status of resources and start or stop them according to external events. The Cluster Server agents for Docker Daemon and Docker Container provide high availability for Docker daemon and Docker containers in a cluster. The Docker daemon provides the base infrastructure for creating and hosting Docker containers. The Docker Container agent monitors the Docker Container instances while they are online and offline. If the system fails, the agent detects failure and takes the container instances offline. Cluster Server initiates failover to another system in the cluster and the agent brings the container instances online.

10 Introducing the agents for Docker How the agents makes Docker highly available 10 Supported software For information on the software versions that the Cluster Server agents for Docker support, see the Symantec Operations Readiness Tools (SORT) site: How the agents makes Docker highly available The Cluster Server agent for Docker Daemon continuously monitors the Docker Daemon process to check the status of the Docker Service. The agent for Docker Daemon is Intelligent Monitoring Framework (IMF) aware and uses Asynchronous Monitoring Framework (AMF) kernel driver for IMF notification. The Cluster Server agent for Docker Container monitors the configured container using the docker inspect command. The agent for Docker Container is IMF aware and uses AMF kernel driver for IMF notification. Features of the agents The Cluster Server agents for Docker Daemon and Docker Container has the following features: Support for First Failure Data Capture (FFDC) In case of a fault, the Docker Daemon and Docker Container agents generate debug logs that enable troubleshooting of the fault. Support for intelligent resource monitoring and poll-based monitoring The Docker Daemon and Docker Container agents support the VCS Intelligent Monitoring Framework feature. IMF allows the agent to register the resources to be monitored with the IMF notification module to receive immediate notification of resource state changes without having to periodically poll the resources. Support for Docker container failover The Docker Container agent supports Docker container failover. Data volumes attached to the containers can also be failed over, if they are configured on the shared storage that is accessible to all the nodes. Docker Daemon agent functions The agent consists of resource type declarations and agent executables. The agent executables are organized into online, offline, monitor, and clean functions.

11 Introducing the agents for Docker Docker Daemon agent functions 11 Online The online function performs the following tasks: Verifies that the Docker daemon is not already stopped. If the daemon is already stopped, it exits immediately. Verifies that the required attributes are set correctly. Attempts to start the specified Docker daemon using the start command specified as part of the DaemonStartCommand attribute. The default start command is /usr/sbin/service docker start. Offline The offline function performs the following tasks: Verifies that the Docker daemon is not already stopped. If the daemon is already stopped, it exits immediately. Verifies that the required attributes are set correctly. Attempts to start the specified Docker daemon using the stop command specified as part of the DaemonStopCommand attribute. The default start command is /usr/sbin/service docker stop. Monitor The monitor function monitors the state of the Docker daemon on all nodes in the cluster. The function performs the following tasks: The first-level check searches for the Docker daemon process. The Docker daemon process pattern can be specified as part of the DaemonProcPattern attribute. Perl regular expression can be specified to match the Docker daemon process pattern. The second-level check for the Docker daemon runs the service docker status command. If the Docker daemon is in the Runnning state, the agent reports the resource as online. Clean The clean function performs the following tasks: If a graceful shutdown was not attempted earlier by the agent, the agent attempts to stop the Docker daemon using the graceful shutdown command. If the Docker daemon process is still running, even after a graceful shutdown attempt, the agent kills the Docker daemon process.

12 Introducing the agents for Docker Docker Container agent functions 12 imf_init This function initializes the Docker Daemon agent to interface with the AMF kernel driver, which is the IMF notification module for the agent for Docker Daemon. This function runs when the agent starts up. imf_getnotification This function gets notifications about resource state changes. This function runs after the agent initializes with the AMF kernel module. This function continuously waits for notification and takes action on the resource upon notification. imf_register This function registers or unregisters resource entities with the AMF kernel module. This function runs for each resource after the resource goes into a steady online or offline state. Docker Container agent functions The agent consists of resource type declarations and agent executables. The agent executables are organized into online, offline, monitor, and clean functions. Online Offline The online function performs the following tasks: Verifies that the container with the name specified in the ContainerName attribute is not already running. If the container with the name specified in the ContainerName attribute is running, it exits immediately and resource is reported online. If a container with the given name does not exists, the online entry point creates a container using the ImageName, DockerRunOptions, and ContainerInitCommand attributes. If a container with the given name exists, the online operation attempts to start the Docker Container using the docker start command. The offline function performs the following tasks: Verifies that the container is not already stopped. If the container is not running, the agent exits immediately and reports the resource as offline.

13 Introducing the agents for Docker Docker Container agent functions 13 Attempts to stop the specified Docker Container using the docker stop --time=<offlinetimeout> command. If the application does not handle the SIGTERM signal, the stop command will wait till the OfflineTimeout seconds before killing the container process forcefully using the SIGKILL signal. Note: OfflineTimeout is a type-level attribute for the Docker Container agent. Monitor The monitor function monitors the state of the Docker container on all nodes in the cluster. The function performs the following tasks: If a container with a given name does not exist, the monitor entry points report the container as offline. If a container with a given name exists, the monitor entry point runs the docker inspect command to get the state of container. Checks for the state of the container. If the state of the container is paused or restarting, it reports the state as unknown. Reports the state of the container as online, if the container is in the running state. Clean The clean function performs the following tasks: Attempts to gracefully shut down the Docker container using the docker stop command. If an attempt to stop the container gracefully fails, it kills the container PID that is retrieved using the docker inspect command on the container.. imf_init This function initializes the Docker Container agent to interface with the AMF kernel driver, which is the IMF notification module for the agent for Docker Container. This function runs when the agent starts up.

14 Introducing the agents for Docker Typical Docker configuration in a VCS cluster 14 imf_getnotification This function gets notifications about resource state changes. This function runs after the agent initializes with the AMF kernel module. This function continuously waits for notification and takes action on the resource upon notification. imf_register This function registers or unregisters resource entities with the AMF kernel module. This function runs for each resource after the resource goes into a steady online or offline state. Typical Docker configuration in a VCS cluster A typical Docker configuration in a VCS cluster has the following characteristics: VCS is installed and configured. The Docker binaries are installed locally on all nodes. The Docker daemon data directory is on the shared storage. The Cluster Server agents for Docker are installed on all nodes. Figure 1-1 depicts a typical Docker configuration. Figure 1-1 Docker Configuration

15 Introducing the agents for Docker Setting up Docker in a VCS cluster 15 Setting up Docker in a VCS cluster Follow the steps below to set up Docker in a cluster: Set up a VCS cluster. Install the Cluster Server agent for Docker Daemon and Docker Container. See Installing the agents on page 20. Configure the Docker Daemon and Docker Container agents for high availability. Configure the service groups for Docker Daemon and Docker Container. See About configuring service groups for Docker on page 36.

16 Chapter 2 Introducing Docker and Docker Daemon process This chapter includes the following topics: About Docker Recommendations for configuring Docker About Docker Docker is an open platform that allows programmers and system administrators to develop, ship, and run distributed applications. It allows programmers to build applications with Docker containers using any language and tools. Docker provides instant application portability. The applications can be assembled quickly, shipped faster, and scaled on thousands of hosts. The Docker applications can also be moved between data centers and clouds and updated with zero downtime. Docker consists of the following components: Docker daemon - A portable and lightweight application runtime and packaging tool. The Docker daemon manages containers and a client, which controls the daemon. Docker containers - A container that comprises the applications and its dependencies. Each container is created from a Docker image. It runs as an isolated process in the user space on the host operating system and shares the kernels with other containers. Docker images - A read-only template that is used to create Docker containers. Docker provides a simple way to create, update, and download images from the Docker registries.

17 Introducing Docker and Docker Daemon process Recommendations for configuring Docker 17 Docker Daemon process The Docker Daemon agent uses the Docker daemon process. The Docker daemon process creates, starts, stops, modifies, and deletes Docker containers in the cluster. Recommendations for configuring Docker This section lists the recommendations and guidelines for configuring Docker Container resources in a VCS environment. Specify all attribute values to ensure high availability of the containers. Specify long running processes before creating containers using the docker run command. Ensure that the Docker images are pulled locally on all of the cluster nodes. If the container does not exist, the agent creates container during the online operation. If image is not available, it would be pulled from the Docker registry, which may consume more time. The OnlineTimeOut attribute value should be set appropriately. If the application running in the Docker container needs to update data persistently, ensure that the data resides on the shared storage. The container data volume should be shared across the cluster nodes.

18 Chapter 3 Installing and removing the agents for Docker This chapter includes the following topics: Before you install the Cluster Server agents for Docker About the ACC library Installing the ACC library Installing the agents Removing the agents Removing the ACC library Before you install the Cluster Server agents for Docker You must install the Cluster Server agents for Docker on all the systems that will host Docker service groups. Ensure that you meet the following prerequisites to install the agents for Docker. Install and configure Cluster Server. For more information about installing and configuring Cluster Server, refer to the Cluster Server installation and configuration guides. Install Docker binaries on each node in the cluster from

19 Installing and removing the agents for Docker About the ACC library 19 About the ACC library The operations of a VCS agent depend on a set of Perl modules known as the ACC library. The library must be installed on each system in the cluster that runs the agent. The ACC library contains common, reusable functions that perform tasks, such as process identification, logging, and system calls. Instructions to install or remove the ACC library on a single system in the cluster are given in the following sections. The instructions assume that the ACCLib tar file has already been extracted. Note: The LogDbg attribute should be used to enable debug logs for the ACCLib-based agents when the ACCLib version is or later and VCS version is 6.2 or later. Installing the ACC library Install the ACC library on each node in the cluster that runs the agent. To install the ACC library 1 Log in as a superuser. 2 Download the ACC library from the Symantec Operations Readiness Tools (SORT) site ( You can download either the complete Agent Pack tar file or the individual ACCLib tar file. 3 If you downloaded the complete Agent Pack tar file, navigate to the Linux directory. Linux cd1/linux/generic/vcs/application/acc_library/ version_library/rpms 4 If you downloaded the individual ACCLib tar file, navigate to the rpms directory. 5 Install the package. Enter Yes if asked to confirm overwriting of files in the existing package. Linux # rpm -ivh \ VRTSacclib-VersionNumber-GENERIC.noarch.rpm

20 Installing and removing the agents for Docker Installing the agents 20 Installing the agents Install the agents for Docker on each node in the cluster. To install the agent in a VCS environment 1 Download the agent from the Symantec Operations Readiness Tools (SORT) site: You can download either the complete Agent Pack tar file or an individual agent tar file. 2 Uncompress the file to a temporary location, say /tmp. 3 If you downloaded the complete Agent Pack tar file, navigate to the Linux directory. Linux cd1/linux/generic/vcs/application/docker_agent/ vcs_version/version_agent/rpms 4 Log in as a superuser. 5 Install the package. Linux # rpm -ihv \ VRTSvcsdocker GENERIC.noarch.rpm The agents for the Docker Daemon and the Docker Container are installed. 6 After installing the agent package, you must import the agent type configuration file. See Importing the agent types files in a VCS environment on page 23. Removing the agents You must uninstall the agents for Docker from a cluster while the cluster is active. To uninstall the agents in a VCS environment 1 Log in as a superuser. 2 Set the cluster configuration mode to read-write by running the following command from any node in the cluster: # haconf -makerw

21 Installing and removing the agents for Docker Removing the ACC library 21 3 Remove all Docker resources from the cluster. Run the following commands to verify that all resources have been removed: # hares -list Type=DockerDaemon # hares -list Type=DockerContainer 4 Remove the agent type from the cluster configuration by running the following commands from any node in the cluster: # hatype -delete DockerDaemon # hatype -delete DockerContainer Removing the agent s type file from the cluster removes the include statement for the agent from the main.cf file, but the agent's type file is not removed from the cluster configuration directory. You can remove the agent s type file later from the cluster configuration directory. 5 Save these changes. Then set the cluster configuration mode to read-only by running the following command from any node in the cluster: # haconf -dump -makero 6 Use the native software management program to remove the agents for Docker from each node in the cluster. Run the following command to uninstall the agents: Linux # rpm -e VRTSvcsdocker Removing the ACC library Perform the following steps to remove the ACC library. To remove the ACC library 1 Ensure that all agents that use ACC library are removed. 2 Run the following command to remove the ACC library package: Linux # rpm -e VRTSacclib

22 Chapter 4 Configuring the agents for Docker This chapter includes the following topics: About configuring the Cluster Server agents for Docker Importing the agent types files in a VCS environment Docker Daemon agent attributes Enabling the Docker Daemon agent to support IMF Docker Container agent attributes Enabling the Docker Container agent to support IMF Limitations of VCS Docker agents About configuring the Cluster Server agents for Docker After installing the Cluster Server agents for Docker, you must import the agent type configuration file. After importing this file, review the attributes table that describes the resource type and its attributes, and then create and configure Docker resources. To view the sample agent type definition and service groups configuration: See About sample configurations for the agents for Docker on page 46.

23 Configuring the agents for Docker Importing the agent types files in a VCS environment 23 Importing the agent types files in a VCS environment To use the agents for Docker, you must import the agent types file into the cluster. You can import the agent types file using the Cluster Manager (Java Console) or using the command line interface (CLI). To import the agent types file using Cluster Manager (Java Console) 1 Start the Cluster Manager and connect to the cluster on which the agent is installed. 2 Click File > Import Types. 3 In the Import Types dialog box, select the following file: /etc/vrtsagents/ha/conf/dockerdaemon/dockertypes.cf 4 Click Import. 5 Save the VCS configuration. The Docker agent types file is now imported to the VCS engine. You can now create Docker resources. For additional information about using the Cluster Manager (Java Console), refer to the Cluster Server Administrator's Guide. To import the agent types file using the CLI: 1 Log on to any one of the systems in the cluster as the superuser. 2 Run the following command: /etc/vrtsagents/ha/conf/dockerdaemon/dockertypes.cmd The Docker agent type is now imported to the VCS engine. You can now create Docker resources. Docker Daemon agent attributes Table 4-1 shows the required attributes for configuring the Docker Daemon agent.

24 Configuring the agents for Docker Docker Daemon agent attributes 24 Table 4-1 Required attributes Required attributes DaemonStartCommand Description The command and the arguments that start the Docker daemon. Ensure that the Docker daemon starts outside the VCS control using the specified command. Type and dimension: string-scalar Default: /usr/sbin/service docker start Example 1: /usr/sbin/service docker start Example 2: /usr/bin/systemctl start docker Example 3: /usr/bin/docker -d --selinux-enabled -g /cfs_mount & DaemonProcPattern The process pattern that uniquely identifies the Docker daemon process. To identify the Docker daemon process, the agent uses this value as a filter in the output of the /bin/ps ww -eo uid,pid,ppid,args command. You can specify the complete process pattern as displayed in the ps -ef command. Alternatively, you can specify the regular expression to uniquely identify the Docker daemon process. Ensure that the agent is able to uniquely identify the Docker daemon process using this pattern. Additionally, you can specify the hostname or port details in the DaemonProcPattern attribute to uniquely identify the Docker daemon process. Type and dimension: string-scalar Default: \\bdocker.*-d Example: \\bdocker -d --selinux-enabled -g /cfs_mount Table 4-2 lists the optional attributes.

25 Configuring the agents for Docker Docker Daemon agent attributes 25 Table 4-2 Optional attributes Optional attribute ResLogLevel Description The logging detail performed by the agent for the resource. Valid values are: ERROR: Only logs error messages. WARN: Logs above plus warning messages. INFO: Logs above plus informational messages. TRACE: Logs above plus trace messages. TRACE is very verbose and should only be used during initial configuration or for troubleshooting and diagnostic operations. Type and dimension: string-scalar Default: INFO Example: TRACE Note: The use of the ResLogLevel attribute is deprecated from VCS version 6.2 onwards. You must use the LogDbg attribute instead of the ResLogLevel attribute to enable debug logs for the ACCLib-based agents, when the ACCLib version is or later. The agent captures the first failure data of the unexpected events and automatically logs debug messages in their respective agent log files. LogDbg For ACCLib-based agents, you must use the LogDbg resource type attribute to enable the debug logs when the ACCLib version is or later and the VCS version is 6.2 or later. Set the LogDbg attribute to DBG_5 to enable debug logs for the ACCLib-based agent. By default, setting the LogDbg attribute to DBG_5 enables debug logs for all Docker resources in the cluster. If debug logs must be enabled for a specific Docker resource, override the LogDbg attribute. For more information on how to enable debug logs, See To enable debug logs for all resources of type Docker on page 45. Type and dimension: keylist Default: No default value For more information on how to use the LogDbg attribute, refer to the Cluster Server Administrator s Guide.

26 Configuring the agents for Docker Docker Daemon agent attributes 26 Table 4-2 Optional attributes (continued) Optional attribute MonitorProgram Description The absolute path name of an external, user-supplied monitor executable. When this attribute is specified, the monitor entry point executes the MonitorProgram file to perform an additional instance state check. There are no restrictions on the actions that the external monitor program performs to determine the state of the Docker Daemon instance. However, the external monitor program must return one of the following integer values: 0: instance is online 110: instance is online 100: instance is offline 1: instance is offline Any other value: instance is unknown. Symantec recommends storing the external monitor utility on the shared disk directory to ensure that the file is always available on the online system. Arguments are supported. Type and dimension: string-scalar Default: No default value Example 1: $ServerRoot/bin/myMonitor.pl Example 2: $ServerRoot/bin/myMonitor.sh arg1 arg2 IMF IMFRegList Determines if the agent must perform the intelligent resource monitoring. You can also override the value of this attribute at the resource level. Specifies the ordered list of attributes whose values are registered with the IMF notification module. The attribute values can be overridden at the resource level.

27 Configuring the agents for Docker Docker Daemon agent attributes 27 Table 4-2 Optional attributes (continued) Optional attribute EnvFile Description The complete file path name required to set the environment before executing the Docker daemon commands. The shell environments supported are ksh, sh, and csh. Type and dimension: string-scalar Default: No default value Example: /test/bin/envvars User The operating system username under which the agent executes programs to manage the Docker daemon. By default, the Docker daemon is started as a user root. Type and dimension: string-scalar Default: root Example: root DaemonStopCommand The command and arguments that stop the Docker daemon. Ensure that the Docker daemon stops outside the VCS control using the specified command. Type and dimension: string-scalar Default: /usr/sbin/service docker stop Example 1: /usr/sbin/service docker stop Example 2: /usr/bin/systemctl stop docker About the keys of the IMF attribute The IMF type-level attribute uses the following keys:

28 Configuring the agents for Docker Docker Daemon agent attributes 28 Table 4-3 Key Mode IMF attribute keys Description Define this attribute to enable or disable intelligent resource monitoring. Valid values are as follows: 0: Does not perform intelligent resource monitoring 2: Performs intelligent resource monitoring for online resources and performs poll-based monitoring for offline resources Note: The agent for Docker supports intelligent resource monitoring for online resources only. Hence, Mode should be set to either 0 or 2. Default: 2 MonitorFreq The frequency at which the agent invokes the monitor agent function. The value of this key is an integer. You can set this key to a non-zero value for cases where the agent requires to perform both poll-based and intelligent resource monitoring. If the value is 0, the agent does not perform poll-based process check monitoring. After the resource registers with the AMF kernel driver, the agent calls the monitor agent function as follows: After every (MonitorFreq x MonitorInterval) number of seconds for online resources After every (MonitorFreq x OfflineMonitorInterval) number of seconds for offline resources Default: 5 RegisterRetryLimit If you enable intelligent resource monitoring, the agent invokes the imf_register agent function to register the resource with the AMF kernel driver. The value of the RegisterRetryLimit key determines the number of times the agent must retry registration for a resource. If the agent cannot register the resource within the limit that is specified, then intelligent monitoring is disabled until the resource state changes or the value of the Mode key changes. Default: 3

29 Configuring the agents for Docker Enabling the Docker Daemon agent to support IMF 29 Enabling the Docker Daemon agent to support IMF By default, the Docker Daemon agent is enabled to support IMF. If the IMF support for Docker Daemon agent is disabled by a user, you can enable the IMF support by setting the IMF Mode attribute to 2. Disabling intelligent resource monitoring To disable intelligent resource monitoring for Docker Daemon 1 Make the VCS configuration writable. # haconf -makerw 2 To disable intelligent resource monitoring for all the resources of a certain type, run the following command: # hatype -modify DockerDaemon IMF -update Mode 0 3 To disable intelligent resource monitoring for a specific resource, run the following command: # hares -override resource_name IMF # hares -modify resource_name IMF -update Mode 0 4 Save the VCS configuration. # haconf -dump -makero Docker Container agent attributes Table 4-1 shows the required attribute for configuring the Docker Container agent. Table 4-4 Required attributes Required attributes ContainerName Description The unique name of the Docker container. To get a container name, run the docker ps -a command. Type and dimension: string-scalar Default: No default value Example 1: evil_ptolemy Example 2: mysql_container_1

30 Configuring the agents for Docker Docker Container agent attributes 30 Table 4-4 Required attributes (continued) Required attributes ImageName Description The Docker image name. This attribute is required if the Docker container is to be created during an online operation. ImageID can also be specified as part of the ImageName attribute. Type and dimension: string-scalar Default: No default value Example 1: Ubuntu Example 2: 8dffsd933n3 Example 3: Docker.io/Ubuntu:latest Table 4-2 lists the optional attributes. Table 4-5 Optional attributes Optional attribute ResLogLevel Description The logging detail performed by the agent for the resource. Valid values are: ERROR: Only logs error messages. WARN: Logs above plus warning messages. INFO: Logs above plus informational messages. TRACE: Logs above plus trace messages. TRACE is very verbose and should only be used during initial configuration or for troubleshooting and diagnostic operations. Type and dimension: string-scalar Default: INFO Example: TRACE Note: The use of the ResLogLevel attribute is deprecated from VCS version 6.2 onwards. You must use the LogDbg attribute instead of the ResLogLevel attribute to enable debug logs for the ACCLib-based agents, when the ACCLib version is or later. The agent captures the first failure data of the unexpected events and automatically logs debug messages in their respective agent log files.

31 Configuring the agents for Docker Docker Container agent attributes 31 Table 4-5 Optional attributes (continued) Optional attribute LogDbg Description For ACCLib-based agents, you must use the LogDbg resource type attribute to enable the debug logs when the ACCLib version is or later and the VCS version is 6.2 or later. Set the LogDbg attribute to DBG_5 to enable debug logs for the ACCLib-based agent. By default, setting the LogDbg attribute to DBG_5 enables debug logs for all Docker resources in the cluster. If debug logs must be enabled for a specific Docker resource, override the LogDbg attribute. For more information on how to enable debug logs, See To enable debug logs for all resources of type Docker on page 45. Type and dimension: keylist Default: No default value For more information on how to use the LogDbg attribute, refer to the Cluster Server Administrator s Guide. ContainerInitCommand The command executed inside the container. Specify full path for the command and specify any arguments to be passed to the container init command. Value of this attribute is used, if the container is created during an online operation. Type and dimension: string-scalar Default: No default value Example 1: /shared_storage/my_application.pl Example 2: /abc/xyz arg1 arg2 DockerBinaryPath The full path to the Docker binary. Type and dimension: string-scalar Default: /usr/bin/docker Example: /path/to/docker

32 Configuring the agents for Docker Docker Container agent attributes 32 Table 4-5 Optional attributes (continued) Optional attribute DockerRunOptions Description The options passed during the docker run command. The -d option can be used to run the container in the detached mode, which is the default value of the DockerRunOptions attribute. Agent passes the --name=$containername option, if the container is to be created during an online operation of the agent. Additional options can be passed as part of this attribute. Type and dimension: integer-scalar Default: -d Example: -d -it -v /my_shared_storage/c1:/c1 EnvFile The complete file path name to source in order to set the environment before executing the docker command. The Docker client will honor the DOCKER_HOST environment variable to set the -H flag for the client. You can specify the following line in the environment file: export DOCKER_HOST="tcp:// :2375" Type and dimension: string-scalar Default: No default value Example: /test/bin/envvars IMF IMFRegList Determines if the agent must perform the intelligent resource monitoring. You can also override the value of this attribute at the resource level. Specifies the ordered list of attributes whose values are registered with the IMF notification module. The attribute values can be overridden at the resource level.

33 Configuring the agents for Docker Docker Container agent attributes 33 Table 4-5 Optional attributes (continued) Optional attribute MonitorProgram Description The absolute path name of an external, user-supplied monitor executable. If specified, the monitor entry point will execute this file to perform an additional server state check. There are no restrictions for what actions the external monitor program performs to determine the state of a Docker Container instance server. The only constraint is that the external monitor program must return one of the following integer values: 0: server is online 110: server is online 100: server is offline 1: server is offline Any other value: state is unknown. Symantec recommends storing the external monitor utility on the shared disk directory to ensure the file is always available on the online system. Type and dimension: string-scalar Default: No default value Example 1: $ServerRoot/bin/myMonitor.pl Example 2: $ServerRoot/bin/myMonitor.sh arg1 arg2 User The account name under which the agent executes programs to manage the Docker container. If unspecified, the Docker daemon is started as user root. Type and dimension: string-scalar Default: root Example: root About the keys of the IMF attribute The IMF type-level attribute uses the following keys:

34 Configuring the agents for Docker Docker Container agent attributes 34 Table 4-6 Key Mode IMF attribute keys Description Define this attribute to enable or disable intelligent resource monitoring. Valid values are as follows: 0: Does not perform intelligent resource monitoring 2: Performs intelligent resource monitoring for online resources and performs poll-based monitoring for offline resources Note: The agent for Docker supports intelligent resource monitoring for online resources only. Hence, Mode should be set to either 0 or 2. Default: 2 MonitorFreq This key value specifies the frequency at which the agent invokes the monitor agent function. The value of this key is an integer. You can set this key to a non-zero value for cases where the agent requires to perform both poll-based and intelligent resource monitoring. If the value is 0, the agent does not perform poll-based process check monitoring. After the resource registers with the AMF kernel driver, the agent calls the monitor agent function as follows: After every (MonitorFreq x MonitorInterval) number of seconds for online resources After every (MonitorFreq x OfflineMonitorInterval) number of seconds for offline resources Default: 5 RegisterRetryLimit If you enable intelligent resource monitoring, the agent invokes the imf_register agent function to register the resource with the AMF kernel driver. The value of the RegisterRetryLimit key determines the number of times the agent must retry registration for a resource. If the agent cannot register the resource within the limit that is specified, then intelligent monitoring is disabled until the resource state changes or the value of the Mode key changes. Default: 3

35 Configuring the agents for Docker Enabling the Docker Container agent to support IMF 35 Enabling the Docker Container agent to support IMF By default, the Docker Container agent is enabled to support IMF. If the IMF support for Docker Container agent is disabled by a user, you can enable the IMF support by setting the IMF Mode attribute to 2. Disabling intelligent resource monitoring To disable intelligent resource monitoring for Docker Container 1 Make the VCS configuration writable. # haconf -makerw 2 To disable intelligent resource monitoring for all the resources of a certain type, run the following command: # hatype -modify DockerContainer IMF -update Mode 0 3 To disable intelligent resource monitoring for a specific resource, run the following command: # hares -override resource_name IMF # hares -modify resource_name IMF -update Mode 0 4 Save the VCS configuration. # haconf -dump -makero Limitations of VCS Docker agents The following are the limitations of the Docker agents. The container rename operation may result in an unexpected behavior when the container is configured under the VCS control. The -d option is required in the detached mode. The DockerRunOptions attribute takes -d as its default value. This option is required because it allows to run a container in the detached mode.

36 Chapter 5 Configuring service groups for Docker This chapter includes the following topics: About configuring service groups for Docker Before configuring the service groups for Docker Configuring service groups for Docker Daemon Configuring service groups for Docker Container About configuring service groups for Docker Configuring the Docker service group involves creating the Docker service group, its resources, and defining attribute values for the configured resources. You must have administrator privileges to create and configure a service group. Before configuring the service groups for Docker Before you configure the Docker service group, you must: Verify that Cluster Server is installed and configured on all nodes in the cluster where you will configure the service group. For more information about installing and configuring Cluster Server, refer to the Cluster Server installation and configuration guides. Verify that the Cluster Server agents for Docker is installed on all nodes in the cluster. See Installing the agents on page 20.

37 Configuring service groups for Docker Configuring service groups for Docker Daemon 37 Verify that the type definition for the Cluster Server agents for Docker is imported into the VCS engine. See Importing the agent types files in a VCS environment on page 23. It is recommended to download the images, else the docker run command pulls images from the registry, which is time consuming. The container start operation may fail. You can set the value of the OnlineTimeOut attribute appropriately to avoid failures. Configuring service groups for Docker Daemon While setting up a cluster, you must always ensure that the cluster has some spare capacity to handle the Docker failover scenarios. For example, in case of any container failure, the cluster must be able to run another container instance in conjunction with other running applications. The cluster should be able to provide application failover by encapsulating the resources required for an application into a service group. A service group is a virtualized application that can switch between the cluster nodes. It contains a set of dependent resources, such as disk groups, disk volumes, file systems, IP addresses, NIC cards, and dependent application processes. It also includes logic about the dependencies between the application components. These service groups should thus be configured such that the cluster can start, stop, monitor, and switch the service groups between the nodes, depending upon the server faults or resource faults. An administrator should also be proactively able to move a service group between cluster nodes to perform preventative maintenance or apply patches.

38 Configuring service groups for Docker Configuring service groups for Docker Container 38 Perform the following steps to add a service group for Docker Daemon 1 Create a service group for Docker Daemon. # hagrp -add <daemon_servicegroup_name> For more details on creating a service group refer to, Cluster Server Administrator's Guide. 2 Modify the SystemList attribute for the group, to add systems. For example, # hagrp -modify <daemon_servicegroup_name> SystemList systema 0 systemb 1 3 Create resource for Docker Daemon in the service group. For example, # hares -add <resource_name> DockerDaemon <daemon_servicegroup_name> For more details on creating and modifying resource attributes for DiskGroup, Volume, and Mount refer to, Cluster Server Bundled Agents Reference Guide. Based on the Docker Daemon instance in your cluster, modify the resource attributes. Configuring service groups for Docker Container Perform the following steps to add a service group for Docker Container 1 Create a service group for Docker Container. # hagrp -add <container_servicegroup_name> For more details on creating a service group refer to, Cluster Server Administrator's Guide. 2 Modify the SystemList attribute for the group, to add systems. For example, # hagrp -modify <container_servicegroup_name> SystemList systema 0 systemb 1

39 Configuring service groups for Docker Configuring service groups for Docker Container 39 3 Create resources for the linked Docker Containers in the service group. For example, # hares -add <docker_container1> DockerContainer <container_servicegroup_name> # hares -add <docker_container2> DockerContainer <container_servicegroup_name> For more details on creating and modifying resource attributes for NIC, IP, DiskGroup, Volume, and Mount refer to, Cluster Server Bundled Agents Reference Guide. Based on the Docker Container instance in your cluster, modify the resource attributes. Perform steps 4 through 6 to mount data volume inside the container. 4 Add the file system to respective agent service group using the Mount, DiskGroup, and Volume resources. Create Mount, DiskGroup, and Volume resources. For example, # hares -DCM652-CS_mnt Mount <container_servicegroup_name> # hares -add DCM652-CS_dg DiskGroup <container_servicegroup_name> Based on the Docker Container instance in your cluster, modify the resource attributes of the Mount, DiskGroup, and Volume resources. 5 Create links between the Mount, DiskGroup, and Volume resources. For example, # hares -link DCM652-CS_mnt DCM652-CS_vol # hares -link -DCM652-CS_vol DCM652-CS_dg 6 Verify the final resource dependencies for <container_servicegroup_name> server group. For example, # hares -dep Group Parent Child <container_servicegroup_name> DCM652-CS_cs DCM652-CS _mnt <container_servicegroup_name> DCM652-CS_mnt DCM652-CS_vol <container_servicegroup_name> DCM652-CS_vol DCM652-CS_dg

Symantec ApplicationHA Release Notes

Symantec ApplicationHA Release Notes Symantec ApplicationHA Release Notes Linux on KVM 6.0 December 2011 Symantec ApplicationHA Release Notes The software described in this book is furnished under a license agreement and may be used only

More information

Cluster Server Agent for Cisco UCS Installation and Configuration Guide

Cluster Server Agent for Cisco UCS Installation and Configuration Guide Cluster Server Agent for Cisco UCS Installation and Configuration Guide Linux 6.2 September 2015 Cluster Server Agent for Cisco UCS Installation and Configuration Guide The software described in this book

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High

More information

Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide

Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide Linux, Solaris 5.1 September 2015 Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 21213723 (October 2011) Veritas Storage Foundation and High

More information

Symantec ApplicationHA 6.2 Generic Agent Configuration Guide - Solaris on Oracle VM Server for SPARC

Symantec ApplicationHA 6.2 Generic Agent Configuration Guide - Solaris on Oracle VM Server for SPARC Symantec ApplicationHA 6.2 Generic Agent Configuration Guide - Solaris on Oracle VM Server for SPARC November 2014 Symantec ApplicationHA Generic Agent Configuration Guide The software described in this

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux Veritas Storage Foundation and High Availability Solutions 6.0.4 Getting Started Guide - Linux September 2013 Veritas Storage Foundation and High Availability Solutions Getting Started Guide The software

More information

Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide

Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide Linux on KVM 6.1 October 2013 Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide The software described in this

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows VCS Library Management Pack Veritas Cluster Server Library Management Pack Guide for Microsoft

More information

Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide

Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide AIX on IBM PowerVM 6.0 November 2011 Symantec ApplicationHA Agent for Apache HTTP Server Configuration Guide The software described

More information

Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide

Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide Cluster Server Agent for IBM InfoSphere DataStage Installation and Configuration Guide Linux, Solaris 7.0 Veritas InfoScale Availability Agents Last updated: 2017-06-30 Legal Notice Copyright 2017 Veritas

More information

Veritas High Availability Agent for WebSphere Application Server Installation and Configuration Guide

Veritas High Availability Agent for WebSphere Application Server Installation and Configuration Guide Veritas High Availability Agent for WebSphere Application Server Installation and Configuration Guide AIX, HP-UX, Linux, Solaris 5.1 June 2012 Veritas High Availability Agent for WebSphere Application

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 5.1 Service Pack 2 September 2011 Symantec ApplicationHA

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

Symantec Enterprise Security Manager Modules for Oracle Release Notes

Symantec Enterprise Security Manager Modules for Oracle Release Notes Symantec Enterprise Security Manager Modules for Oracle Release Notes Release 5.0 for Symantec ESM 9.0 and 10.0 For Red Hat Enterprise Linux, HP-UX, AIX, Solaris, and Windows Symantec Enterprise Security

More information

Veritas Dynamic Multi-Pathing readme

Veritas Dynamic Multi-Pathing readme Veritas Dynamic Multi-Pathing readme Linux DMP 5.1 Rolling Patch 1 Patch 0 Veritas Dynamic Multi-Pathing Readme The software described in this book is furnished under a license agreement and may be used

More information

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Linux on KVM 6.2 December 2014 Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide The software

More information

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Windows Server 2003 (x64), Windows Server 2008 and 2008 R2 (x64) 5.1 Service Pack 2 06/13/2011 Symantec ApplicationHA

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10 Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this

More information

Symantec High Availability Agent for WebSphere Application Server Installation and Configuration Guide

Symantec High Availability Agent for WebSphere Application Server Installation and Configuration Guide Symantec High Availability Agent for WebSphere Application Server Installation and Configuration Guide AIX, HP-UX, Linux, Solaris 5.1 December 2013 Symantec High Availability Agent for WebSphere Application

More information

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Linux 5.1 Service Pack 2 June 13, 2011 Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide

More information

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines HP-UX 11i v3 5.0.1 Veritas Storage Foundation and High Availability Solutions Application

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec ApplicationHA Agent for MySQL Configuration Guide

Symantec ApplicationHA Agent for MySQL Configuration Guide Symantec ApplicationHA Agent for MySQL Configuration Guide Linux on KVM 6.2 December 2014 Symantec ApplicationHA Agent for MySQL Configuration Guide The software described in this book is furnished under

More information

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas CommandCentral Enterprise Reporter Release Notes Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6 Symantec NetBackup for Lotus Notes Administrator's Guide Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide Linux on VMware 6.2 December 2014 Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide The

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Symantec ApplicationHA Agent for MySQL Configuration Guide

Symantec ApplicationHA Agent for MySQL Configuration Guide Symantec ApplicationHA Agent for MySQL Configuration Guide Linux on VMware 6.2 December 2014 Symantec ApplicationHA Agent for MySQL Configuration Guide The software described in this book is furnished

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Symantec Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Symantec Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows 6.1 July 2015 Symantec Storage Foundation and High Availability Solutions

More information

Symantec ApplicationHA 6.2 Release Notes - AIX on IBM PowerVM

Symantec ApplicationHA 6.2 Release Notes - AIX on IBM PowerVM Symantec ApplicationHA 6.2 Release Notes - AIX on IBM PowerVM November 2014 Symantec ApplicationHA Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec ApplicationHA 6.1 Agent for WebSphere Application Server Configuration Guide - Linux on VMware

Symantec ApplicationHA 6.1 Agent for WebSphere Application Server Configuration Guide - Linux on VMware Symantec ApplicationHA 6.1 Agent for WebSphere Application Server Configuration Guide - Linux on VMware January 2014 Symantec ApplicationHA 6.1 Agent for WebSphere Application Server Configuration Guide

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Deployment Scanner 10.0 Symantec Enterprise Vault: Deployment Scanner The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping The software

More information

Symantec Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide

Symantec Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide Symantec Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide Linux, Solaris 5.0 December 2013 Symantec Cluster Server Agent for EMC RecoverPoint Installation and Configuration

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 March 2012 Symantec ApplicationHA Agent for Microsoft

More information

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Windows on VMware 6.1 February 2014 Symantec ApplicationHA Agent for Microsoft SQL Server 2008 Configuration Guide

More information

Symantec ApplicationHA Agent for MySQL Configuration Guide

Symantec ApplicationHA Agent for MySQL Configuration Guide Symantec ApplicationHA Agent for MySQL Configuration Guide Linux on VMware 6.0 March 2012 Symantec ApplicationHA Agent for MySQL Configuration Guide The software described in this book is furnished under

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

Symantec NetBackup Appliance Fibre Channel Guide

Symantec NetBackup Appliance Fibre Channel Guide Symantec NetBackup Appliance Fibre Channel Guide Release 2.6.1.2 NetBackup 52xx and 5330 Symantec NetBackup Appliance Fibre Channel Guide Documentation version: 2.6.1.2 Legal Notice Copyright 2015 Symantec

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 September 2012 Veritas

More information

Veritas High Availability Agent for Documentum Content Server Installation and Configuration Guide

Veritas High Availability Agent for Documentum Content Server Installation and Configuration Guide Veritas High Availability Agent for Documentum Content Server Installation and Configuration Guide AIX, HP-UX, Linux, Solaris 5.1 June 2010 Veritas High Availability Agent for Content Server Installation

More information

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 October 2011 Veritas

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

Symantec High Availability Agent for PostgreSQL Installation and Configuration Guide

Symantec High Availability Agent for PostgreSQL Installation and Configuration Guide Symantec High Availability Agent for PostgreSQL Installation and Configuration Guide AIX, HP-UX, Linux, Solaris SPARC 5.1 June 2014 Symantec High Availability Agent for PostgreSQL Installation and Configuration

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 1 Veritas Storage Foundation

More information

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5. Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL

More information

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only

More information

Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide

Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide Linux, Solaris 6.2 September 2015 Cluster Server Agent for EMC RecoverPoint Installation and Configuration Guide The software

More information

Symantec ApplicationHA 6.1 Release Notes - Solaris on Oracle VM Server for SPARC

Symantec ApplicationHA 6.1 Release Notes - Solaris on Oracle VM Server for SPARC Symantec ApplicationHA 6.1 Release Notes - Solaris on Oracle VM Server for SPARC December 2013 Symantec ApplicationHA 6.1 Release Notes The software described in this book is furnished under a license

More information

Symantec High Availability Console Installation and Upgrade Guide

Symantec High Availability Console Installation and Upgrade Guide Symantec High Availability Console Installation and Upgrade Guide Windows 6.2 June 2015 Symantec High Availability Console Installation and Upgrade Guide The software described in this book is furnished

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.1 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide The software described in this book is furnished

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.7 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Documentation version: 7.7 Legal Notice Copyright

More information

Symantec ApplicationHA Agent for JBoss Application Server Configuration Guide

Symantec ApplicationHA Agent for JBoss Application Server Configuration Guide Symantec ApplicationHA Agent for JBoss Application Server Configuration Guide Linux on KVM 6.1 June 2014 Symantec ApplicationHA Agent for JBoss Application Server Configuration Guide The software described

More information

Symantec High Availability Solutions Guide for VMware

Symantec High Availability Solutions Guide for VMware Symantec High Availability Solutions Guide for VMware Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 September 2012 Symantec High Availability Solution Installation and Configuration Guide

More information

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5 Security Content Update 2016-1 Release Notes Versions: CCS 11.1 and CCS 11.5 SCU 2016-1 Release Notes for CCS 11.1 and CCS 11.5 Legal Notice Copyright 2016 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7 Symantec NetBackup OpsCenter Reporting Guide Release 7.7 Symantec NetBackup OpsCenter Reporting Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Cluster Server Agent suite for Sun JES Messaging Server Installation and Configuration Guide

Cluster Server Agent suite for Sun JES Messaging Server Installation and Configuration Guide Cluster Server Agent suite for Sun JES Messaging Server Installation and Configuration Guide Solaris 5.0 September 2015 Cluster Server Agent suite for Sun JES Messaging Server Installation and Configuration

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Symantec ApplicationHA Agent for WebSphere MQ Configuration Guide

Symantec ApplicationHA Agent for WebSphere MQ Configuration Guide Symantec ApplicationHA Agent for WebSphere MQ Configuration Guide Linux on VMware 6.1 December 2013 Symantec ApplicationHA Agent for WebSphere MQ Configuration Guide The software described in this book

More information

Symantec High Availability Agent for WebSphere MQ Installation and Configuration Guide

Symantec High Availability Agent for WebSphere MQ Installation and Configuration Guide Symantec High Availability Agent for WebSphere MQ Installation and Configuration Guide Windows 6.1 December 2014 Symantec High Availability Agent Symantec Agent Pack for WebSphere MQ Installation and Configuration

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Symantec High Availability 7.0 Solution Guide for VMware - Linux

Symantec High Availability 7.0 Solution Guide for VMware - Linux Symantec High Availability 7.0 Solution Guide for VMware - Linux July 2015 Symantec High Availability Solution Guide for VMware The software described in this book is furnished under a license agreement

More information

Veritas Storage Foundation and High Availability Solutions Virtualization Guide

Veritas Storage Foundation and High Availability Solutions Virtualization Guide Veritas Storage Foundation and High Availability Solutions Virtualization Guide Solaris 6.0 November 2014 Veritas Storage Foundation and High Availability Solutions Virtualization Guide The software described

More information

Cluster Server Agent for Oracle GoldenGate Installation and Configuration Guide

Cluster Server Agent for Oracle GoldenGate Installation and Configuration Guide Cluster Server Agent for Oracle GoldenGate Installation and Configuration Guide AIX, Linux, Solaris 5.0 September 2015 Cluster Server Agent for Oracle GoldenGate Installation and Configuration Guide The

More information

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used

More information

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris Cluster Server 7.3.1 Generic Application Agent Configuration Guide - AIX, Linux, Solaris Last updated: 2017-11-04 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010 Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010 Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 December

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010 Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2010 Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 September

More information

Symantec ApplicationHA Agent for SAP Web Application Server Configuration Guide

Symantec ApplicationHA Agent for SAP Web Application Server Configuration Guide Symantec ApplicationHA Agent for SAP Web Application Server Configuration Guide Linux on VMware 6.0 July 2013 Symantec ApplicationHA Agent for SAP Web Application Server Configuration Guide The software

More information

Cluster Server Agent for MySQL MySQL Installation and Configuration Guide

Cluster Server Agent for MySQL MySQL Installation and Configuration Guide Cluster Server Agent for MySQL MySQL Installation and Configuration Guide AIX, Linux, Solaris 7.0 March 2017 Cluster Server Agent for MySQL Installation and Configuration Guide Last updated: 2017-03-29

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information